AI Tools have become extremely popular in the software industry and are currently in the initial phase of adoption by other industries as well. There have been several AI-based projects that are gaining popularity day by day. However, the security and risks of these...
Newsroom
The latest cybersecurity news from around the globe
Filter: All | QD5 Articles | Quantum Computing | Artificial Intelligence | Cybersecurity | Encryption
Quantum computers could overtake classical ones within 2 years
"These machines are coming," Sabrina Maniscalco, CEO of Helsinki-based quantum-computing startup Algorithmiq, told Nature News. Read the full article by Tia Ghose at Space.com
China’s cyber assault on Taiwan
"We are already at war," Kitsch Yen-Fan, assistant director for the Global China Hub at the Atlantic Council, told 60 Minutes. "This is a constant thing." Read the full article by Brit McCandless Farmer at 60 Minutes
Data Privacy in Europe and North America: An Introduction
Governments across the world are scrambling to respond to the growing number of data breaches by passing legislation that strengthens consumer data privacy protections and aims to prevent criminals from harvesting personal information. Investigate the scope of these...
Secure by Design: A Primer
Secure by Design is one of the most popular development methodologies used today because it ensures that data privacy and cybersecurity are integrated into every step of the development lifecycle. Secure by Design is a software and hardware development methodology...
An Emerging Quantum Threat: The QUANTUM DEFEN5E Approach
Cybersecurity experts and national leaders are preparing for Q-Day, the day when quantum computers will finally render conventional cyber protections obsolete, stripping away the protections that have until now made e-commerce possible. Quantum computing is a...
Over 130,000 Solar Panel Installations Exposed Online
Based on recent reports from Cyble, there has been a large attack vector for threat actors in the Solar industry’s PV (Photo-Voltaic) diagnostic and monitoring systems. These systems are used to measure efficiency, detect faults, and optimize overall operations. The...
JokerSpy – Multi-Stage macOS Malware Attacking Organisation Worldwide
MacOS is reported to be one of the most security Operating Systems. As of the beginning of 2023, there are over 100 million macOS devices worldwide. Due to its popularity, threat actors have begun to target macOS devices recently. Based on the recent reports from...
Hackers Use Weaponized OpenSSH Tool to Hijack Linux Systems
Cybersecurity researchers at Microsoft recently found an attack targeting Linux-based systems and IoT devices. It has been identified that the exploit employs custom and open-source tools to gain control of the impacted devices and install cryptomining malware on them...
New PoC Exploit Published for Cisco AnyConnect Flaw Granting System Privileges
Many organizations worldwide have used Cisco AnyConnect VPNs due to their security and other great features. Cisco has many products for VPN depending upon the platforms with various versions of Software. Cisco has released a new security advisory that patches a...
New Stealer-as-a-Ransomware Delivered Through Fake Updates
Recently, the cybersecurity analysts at Zscaler found a new variant of malware, RedEnergy, a new hybrid Stealer-as-a-Ransomware threat. RedEnergy stealer targets industries through fake updates, stealing data from browsers, exfiltrating sensitive information, and...
Hackers Compromised the Roundcube Email Servers of Ukrainian organizations
APT28 (aka BlueDelta, Fancy Bear, Sednit, and Sofacy), a threat group connected to Russia’s GRU, hacked the Roundcube email servers of over 40 Ukrainian organizations, including government bodies. The cyber-espionage group used news about the Russia-Ukraine conflict...
An IBM Quantum Computer Beat a Supercomputer in a Benchmark Test
Quantum computers may soon tackle problems that stump today’s powerful supercomputers—even when riddled with errors. Read the full article by Shelly Fan at Singularity Hub
Qubit Quest Takes a Topological Turn
Google and Quantinuum bring a new, promising particle into the quantum computer road map Read the full article by Margo Anderson at IEEE Spectrum
Quantum Computing Is Nearing A Breakthrough That Will Change Everything
A quantum computing breakthrough by IBM cuts through sub-atomic noise to achieve the most powerful signal imaginable. Read the full article by Douglas Helm at GIANT FREAKIN ROBOT
Russian National Arrested For Launching LockBit Ransomware Attacks
LockBit has become the most reputable ransomware group in recent times. The method by which they operate differs from other ransomware groups. LockBit recruits people as affiliates for deploying ransomware inside organizations. The U.S. Department of Justice announced...
Quantum hacking alert: Critical vulnerabilities found in quantum key distribution
The attacks demonstrated that when the vulnerability is not adequately protected, an attacker may exploit it to obtain the entire key information. Read the full article by Liu Jia, Chinese Academy of Sciences
Exclusive: US government agencies hit in global cyberattack
The US Cybersecurity and Infrastructure Security Agency “is providing support to several federal agencies that have experienced intrusions affecting their MOVEit applications” Read the full article by Sean Lyngaas at CNN
The US Navy, NATO, and NASA Are Using a Shady Chinese Company’s Encryption Chips
The US government warns encryption chipmaker Hualan has suspicious ties to China’s military. Yet US agencies still use one of its subsidiary’s chips, raising fears of a backdoor.
Secure Communication Breakthrough: 1,000+ km Quantum Key Distribution
QKD is based on the principles of quantum mechanics and enables secure key distribution between two remote parties. When combined with the “one-time pad” encryption method, it can achieve the highest level of security for confidential communication. Read the...
IBM quantum computer passes calculation milestone
‘Benchmark’ experiment suggests quantum computers could have useful real-world applications within two years. Read the full article by Davide Castalvecchi at nature
DOD’s David McKeown: Pentagon Moving to Quantum-Resistant Algorithms in Crypto Modernization Push
The Department of Defense is already taking precautions against potential future quantum threats by modernizing its cryptography, which he said in most cases is “either obsolete or nearing obsolescence." Read the full article by Summer Myatt at GOVCONWire
Lessons From The 1,802 Data Breaches Of 2022: A Deeper Dive Into Internet Safety
The year 2022 has been a wake-up call for the digital world. A staggering 1,802 data compromises were reported globally, affecting 422 million individuals, emphasizing the urgent need to ramp up online security measures. These breaches served as a harsh reminder that...
US govt banned NSO’s Pegasus, but said to buy rival spyware Paragon Graphite
The US government banned the use of NSO’s Pegasus spyware 18 months ago, but a new report today says that at least one government agency is using very similar malware from a rival company: Paragon Graphite. Read the full article by Ben Lovejoy at 9to5Mac
The great CISO resignation: Why security leaders are quitting in droves
With ransomware becoming increasingly commoditized and generative AI tools like ChatGPT broadening hackers’ arsenal, organizations are increasingly under attack in what some are calling a cyber cold war. Read the full article by Taryn Plumb at...
GobRAT Malware Attacking Linux Routers to Deploy Backdoor
After an internet-exposed router is compromised, a loader script is deployed to deliver GobRAT, which disguises itself as the Apache daemon process (apached) to avoid being detected. The post GobRAT Malware Attacking Linux Routers to Deploy Backdoor appeared first on...
What is Zero-Trust? – How Does It Protect Your Enterprise From Cyber Attacks?
Traditional perimeter-based security measures must be upgraded in an increasingly interconnected digital ecosystem where the frequency and sophistication of cyber attacks are increasing. Enterprises face the burden of protecting sensitive data and vital systems from...
COSMICENERGY – New OT Malware Causes Electric Power Disruption
COSMICENERGY is a unique tool developed by a contractor for power disruption exercises. This malware shows that developing offensive OT capabilities is becoming easier as attackers learn from previous attacks. The post COSMICENERGY – New OT Malware Causes Electric...
Critical OAuth Framework Flaw Let Attackers Hijack Accounts & Steal Sensitive Data
OAuth Flaw in Expo Platform affects hundreds of Third-Party sites, apps. An attacker can exploit this vulnerability in the expo framework by sending a malicious link to a victim. The post Critical OAuth Framework Flaw Let Attackers Hijack Accounts & Steal...
IBM’s quantum leap: A 100,000-Qubit supercomputer on the horizon
IBM has unveiled its ambitious plan to construct a groundbreaking 100,000-qubit quantum computer within the next decade. Read the full article by Abdul-Rahman Oladimeji Bello at Interesting Engineering
Microsoft leaps into the AI regulation debate, calling for a new US agency and executive order
Microsoft joined a sprawling global debate on the regulation of artificial intelligence Thursday, echoing calls for a new federal agency to control the technology's development and urging the Biden administration to approve new restrictions on how the US government...
IT Security Analyst Pleaded Guilty for Attacking his Own Company
The insider threat has been a significant concern for organizations in terms of security. Though they do not happen very often, it is still a major threat to the business. Ashley Liles, a 28-year-old IT Security Analyst working at Oxford BioMedica, was tasked...
ODNI’s Adele Merritt Highlights 5 Key Intelligence Community Priorities for 2023
“While our community is excited about all the benefits, opportunities and capabilities that operating in a multi-cloud environment bring, we are also concerned about the additional cybersecurity risks,” Merritt added. Read the full article by Ireland Degges at...
‘Vulkan files’ leak reveals Putin’s global and domestic cyberwarfare tactics
Russian program aims to control internet and spread disinformation Read the full article by Luke Harding, Stiliyana Simeonova, Manisha Ganguly and Dan Sabbagh
Stop Blaming the End User for Security Risk
Don't count on securing end users for system security. Instead, focus on better securing the systems — make them closed by default and build with a security-first approach. Read the full article by John A. Smith at DARKReading
Full-Stack Engineer
Full-stack Senior Engineer
Product Engineering Manager
How the Global Spyware Industry Spiraled Out of Control
The market for commercial spyware — which allows governments to invade mobile phones and vacuum up data — is booming. Read the full article by Mark Mazzetti, Ronen Bergman and Matina Stevis-Gridneff at The New York Times
Quantum Cryptography Apocalypse: A Timeline and Action Plan
Quantum computing's a clear threat to encryption, and post-quantum crypto means adding new cryptography to hardware and software without being disruptive. Read the full article by Konstantinos Karagiannis at DARKReading